Various prior art
information assurance techniques and systems have been developed that attempt to identify and counteract actual or potential threats to the
confidentiality, integrity, and availability of data within systems and networks; however, a number of limitations are inherent in these prior art techniques and systems.
Although several
information assurance techniques, including MAC, exist for marking data, the practical applicability of current data marking, control, and evaluation techniques are often fraught with technical and organizational problems.
As a result, object data that is marked utilizing a first marking and evaluation technique cannot be accessed by a
system that utilizes a second marking and evaluation technique.
The combination of multiple
operating system and
software packages results in the marking of
data objects according to a myriad of techniques that are incompatible with one another.
Additionally, the design,
engineering, and implementation of information assurance systems is
time consuming and expensive largely due to the mapping and integration of their complex capabilities into a comprehensive security approach, or policy.
The time and cost needed to successfully implement an information assurance
system is also affected by the experience and knowledge of the developers and engineers responsible for its development, testing, and deployment.
In many cases the
development staff is aware of the core functional requirements of their specific application such as, for example, the means for creating a report using underlying
business data; however, the
development staff often possesses only rudimentary knowledge regarding the theory and practical application of information assurance techniques.
This disconnect often results in ineffective security
enforcement within the application, network or system, which can lead to excessive disclosure of protected information.
Additionally, many existing information assurance products are designed to protect simple file-based access solutions and do not take into account dynamically generated data or information.
In other words, the existing systems can protect a stored file but cannot adequately protect data that is dynamically generated in real time.
Additional information assurance challenges exist in the
Service Oriented Architectures (‘SOA’) that are rapidly gaining prominence within
software developer communities.
These independent services further complicate the information assurance landscape because each service is free to establish its own security methods and policy.
Another obstacle to the development and deployment of information assurance systems is the concern over the performance of the system.
A controlled interface typically filters data as it is delivered, resulting in a computationally expensive operation that degrades overall system performs.